Microsoft

MicrosoftSecurity

Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model

Credit to Author: Todd VanderArk| Date: Wed, 23 Oct 2019 19:00:33 +0000

Digital transformation has made the traditional perimeter-based network defense obsolete. A new white paper helps you understand the core principles of a Zero Trust approach.

The post Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model appeared first on Microsoft Security.

Read More
MicrosoftSecurity

Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Credit to Author: Eric Avena| Date: Mon, 21 Oct 2019 15:00:56 +0000

We’ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer.

The post Microsoft and partners design new device security requirements to protect against targeted firmware attacks appeared first on Microsoft Security.

Read More
MicrosoftSecurity

Top 6 email security best practices to protect against phishing attacks and business email compromise

Credit to Author: Eric Avena| Date: Wed, 16 Oct 2019 17:00:11 +0000

What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.

The post Top 6 email security best practices to protect against phishing attacks and business email compromise appeared first on Microsoft Security.

Read More